This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: easily setup (e.g. lock and key system at hiring kiosks). The wireless security could have been beefed up to the more recent WPA (wifi protected access) as well. The overall changes that occurred due to the theft were pretty big. Most importantly, TJX began to comply with the strict financial guidelines that they previously ignored. Consumer groups and banks have also begun to lobby against the retail giant; filing lawsuits for lost data. In the end, more than 75 percent of consumers have refused to shop at the affected retailers. This has led to a financial massacre of TJX and to date; the company is still waiting for the final damage report. References Laudon, Kenneth C., and Jane Price. Laudon. "Chapter 7 - Securing Information Systems." Essentials of Management Information Systems . Upper Saddle River, NJ: Pearson/Prentice Hall, 2009. Print....
View Full Document
This note was uploaded on 10/17/2010 for the course IT 205 IT 205 taught by Professor Taylor during the Spring '09 term at University of Phoenix.
- Spring '09